Re: Tor v.s. My Proxy Daisy Chain

"RMCG" <> wrote in message news:-privat.org...
> I grow weed illegally and am an IT specialist who has this asshole
> called wilbur calling me out for bullshit. He says Tor is the nazz and
> I KNOW Tor sucks and I can configure a daisy chain of proxies that is
> better.
>
> He sent me to these newsgroups to talk to "professionals" rotflmao
> about that but I'll give you a day in my court.--

Since you have a real opinion, I'll give you a real answer.

With a fixed path such as a daisy chain of proxies, it is a relatively
simple matter to break each one in turn, tracing everything back to you.
From a law enforcement standpoint, its useless.

With Tor, because the path itself is random it is necesssary to break all
systems in the entire network. Since there are many more users of Tor it is
exceptionally more difficult.

This is the foundation of onion routing and why you are completely wrong.
Joe

Advertisements

On Sun, 29 Aug 2010 15:21:03 -0400, RMCG wrote:
> On Wed, 25 Aug 2010 04:08:37 -0700, Joseph Ashwood wrote:
>
>> "RMCG" <> wrote in message news:-privat.org...
>>> I grow weed illegally and am an IT specialist who has this asshole
>>> called wilbur calling me out for bullshit. He says Tor is the nazz and
>>> I KNOW Tor sucks and I can configure a daisy chain of proxies that is
>>> better.
>>>
>>> He sent me to these newsgroups to talk to "professionals" rotflmao
>>> about that but I'll give you a day in my court.--
>>
>> Since you have a real opinion, I'll give you a real answer.
>>
>> With a fixed path such as a daisy chain of proxies, it is a relatively
>> simple matter to break each one in turn, tracing everything back to you.
>> From a law enforcement standpoint, its useless.
>>
>> With Tor, because the path itself is random it is necesssary to break all
>> systems in the entire network. Since there are many more users of Tor it is
>> exceptionally more difficult.
>>
>> This is the foundation of onion routing and why you are completely wrong.
>> Joe
>
> I've done quite a bit of research over the years looking for the best
> way to keep my internet traffic secure and anonymous. I've tried and
> used many services, everything from proxies to ssh tunnels and I've
> been using an OpenVPN service from Perfect-Privacy for a while now and
> have been extremely pleased with it so far. FYI, I used to work in the
> networking field in the past (altho it changes and advances so damn
> fast) so this isn't a clueless newbs rant
>
> These guys are the Nuts!! (if you play poker you know what I mean)
>
> You can do an openvpn connection to one of their several servers
> around the world, then add a ssh tunnel to another servers squid
> proxy, and chain that to another servers socks 5 proxy. It can get
> pretty slow the more you chain it, but it's about as secure as you can
> get. Also, all their servers (according to them at least and I have
> been given no reason to doubt them) have highly encrypted hard drives
> on hardened Linux Servers and do not use any logging features at all.

They don't log?

lol

P-P just got their admins busted in Germany. When you go connecting to
servers all over creation, expect to run into some rather irrational
LEOs and damning judicial systems..

Get over it.
--
Passwords, people, they are not just for game shows. If you refuse to
make the effort to remember a few long, diverse passwords, then don't
scream at me when your FICO is 496 and your bank accounts are zeroed
out.

Advertisements

On 8/29/2010 3:53 PM, Ari Silverstein wrote:
> On Sun, 29 Aug 2010 15:21:03 -0400, RMCG wrote:
>
>> On Wed, 25 Aug 2010 04:08:37 -0700, Joseph Ashwood wrote:
>>
>>> "RMCG" <> wrote in message news:-privat.org...
>>>> I grow weed illegally and am an IT specialist who has this asshole
>>>> called wilbur calling me out for bullshit. He says Tor is the nazz and
>>>> I KNOW Tor sucks and I can configure a daisy chain of proxies that is
>>>> better.
>>>>
>>>> He sent me to these newsgroups to talk to "professionals" rotflmao
>>>> about that but I'll give you a day in my court.--
>>> Since you have a real opinion, I'll give you a real answer.
>>>
>>> With a fixed path such as a daisy chain of proxies, it is a relatively
>>> simple matter to break each one in turn, tracing everything back to you.
>>> From a law enforcement standpoint, its useless.
>>>
>>> With Tor, because the path itself is random it is necesssary to break all
>>> systems in the entire network. Since there are many more users of Tor it is
>>> exceptionally more difficult.
>>>
>>> This is the foundation of onion routing and why you are completely wrong.
>>> Joe
>> I've done quite a bit of research over the years looking for the best
>> way to keep my internet traffic secure and anonymous. I've tried and
>> used many services, everything from proxies to ssh tunnels and I've
>> been using an OpenVPN service from Perfect-Privacy for a while now and
>> have been extremely pleased with it so far. FYI, I used to work in the
>> networking field in the past (altho it changes and advances so damn
>> fast) so this isn't a clueless newbs rant
>>
>> These guys are the Nuts!! (if you play poker you know what I mean)
>>
>> You can do an openvpn connection to one of their several servers
>> around the world, then add a ssh tunnel to another servers squid
>> proxy, and chain that to another servers socks 5 proxy. It can get
>> pretty slow the more you chain it, but it's about as secure as you can
>> get. Also, all their servers (according to them at least and I have
>> been given no reason to doubt them) have highly encrypted hard drives
>> on hardened Linux Servers and do not use any logging features at all.
> They don't log?
>
> lol
>
> P-P just got their admins busted in Germany. When you go connecting to
> servers all over creation, expect to run into some rather irrational
> LEOs and damning judicial systems..
>
> Btw, OpenVPN only supports 2Kbit PKE anf P-P claims they use 4K PKE
> with OpenVPN.
>
> Translation: They lie.
>
> Tor.
>
> Get over it.

Talking to yourself again, Frank? (a.k.a. Frank J. Camper, King of the
Sockpuppets)

No one else will talk to him, so he has to talk to himself using made up
characters with made up names.

In article <-privat.org>
RMCG <> wrote:
>
>
> I've done quite a bit of research over the years looking for the best
> way to keep my internet traffic secure and anonymous. I've tried and
> used many services, everything from proxies to ssh tunnels and I've
> been using an OpenVPN service from Perfect-Privacy for a while now and
> have been extremely pleased with it so far. FYI, I used to work in the
> networking field in the past (altho it changes and advances so damn
> fast) so this isn't a clueless newbs rant
>
> These guys are the Nuts!! (if you play poker you know what I mean)
>
> You can do an openvpn connection to one of their several servers
> around the world, then add a ssh tunnel to another servers squid
> proxy, and chain that to another servers socks 5 proxy. It can get
> pretty slow the more you chain it, but it's about as secure as you can
> get. Also, all their servers (according to them at least and I have
> been given no reason to doubt them) have highly encrypted hard drives
> on hardened Linux Servers and do not use any logging features at all.

It always boils down to the "no logging" thing.
Perfect-Privacy has the usual Terms and Conditions as found onhttp://perfect-privacy.com/terms.html. If there truly is no logging, by
what means would Perfect-Privacy enforce their terms?

On Sun, 29 Aug 2010 20:46:48 +0000, Anonymous wrote:
> In article <-privat.org>
> RMCG <> wrote:
>>
>
>>
>> I've done quite a bit of research over the years looking for the best
>> way to keep my internet traffic secure and anonymous. I've tried and
>> used many services, everything from proxies to ssh tunnels and I've
>> been using an OpenVPN service from Perfect-Privacy for a while now and
>> have been extremely pleased with it so far. FYI, I used to work in the
>> networking field in the past (altho it changes and advances so damn
>> fast) so this isn't a clueless newbs rant
>>
>> These guys are the Nuts!! (if you play poker you know what I mean)
>>
>> You can do an openvpn connection to one of their several servers
>> around the world, then add a ssh tunnel to another servers squid
>> proxy, and chain that to another servers socks 5 proxy. It can get
>> pretty slow the more you chain it, but it's about as secure as you can
>> get. Also, all their servers (according to them at least and I have
>> been given no reason to doubt them) have highly encrypted hard drives
>> on hardened Linux Servers and do not use any logging features at all.
>
> It always boils down to the "no logging" thing.
> Perfect-Privacy has the usual Terms and Conditions as found on
> http://perfect-privacy.com/terms.html. If there truly is no logging, by
> what means would Perfect-Privacy enforce their terms?

They can't but as a VPN they don't have too keep logs by law (USA). To
keep their systems running, they just remember everything.

*LOL*

Our friend Rocky Mountain Illegal Marijuana Grower has a couple of
problems. One, he's has a little knowledge that has exploded into his
version of genius and 2) he'll get his ass busted soon enough anyway
so what difference will it make?
-- http://www.vitals.com/doctors/Dr_Ari_Silverstein.html

Share This Page

Welcome to Velocity Reviews!

Welcome to the Velocity Reviews, the place to come for the latest tech news and reviews.

Please join our friendly community by clicking the button below - it only takes a few seconds and is totally free. You'll be able to chat with other enthusiasts and get tech help from other members.
Sign up now!